Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

Note! H19-376 has been withdrawn. The new exam code is H19-376_V1.0

H19-376 Practice Exam Questions with Answers HCS-Pre-sales-IP(Security) Certification

Question # 6

Check the command of the NGFW firewall forwarding process packet statistics.

A.

display firewall session statistics

B.

display firewall static system discard

C.

display firewall statistic system table

D.

display firewall server-map

Full Access
Question # 7

On the USG, the hot standby is configured on the Layer 2 network. If the standby device is forwarded, there is a loop risk.

A.

True

B.

False

Full Access
Question # 8

The main function of Firehunter is to detect unknown threats in files.

A.

True

B.

False

Full Access
Question # 9

The following inter-domain policy for the NGFW firewall is incorrect:

A.

The firewall supports only inter-domain security policies, and does not support intra-domain security policies.

B.

The trust level of the default domain is LOCAL1> TRUST> DMZ> UNTRUST from high to low

C.

In the case where the VFW domain and the root wall domain can be established, the trusted Chengdu of the VFW domain is higher than the root wall domain

D.

Custom domain priority can be specified by yourself

Full Access
Question # 10

What information can the Huawei sandbox obtain in the sample test report?

A.

Behavior capture chart

B.

Basic information of the document

C.

Document dissemination information

D.

Dynamic behavior flow

E.

Threat behavior classification

Full Access
Question # 11

The Huawei firewall dual-system hot backup function supports backup of the following information in the preparation machine:

A.

Server Map table

B.

Key configuration scripts

C.

Session table

D.

All configuration scripts

Full Access
Question # 12

There are 3 users A, B, and C. There is a NAT device between the 3 users and the firewall. The same is done for the three A/B/C users.

NAT conversion, the configuration on the firewall allows A, B to access external network resources, and does not allow C to access external network resources. When user A authenticates

After passing, can user C access external network resources?

A uncertain

B can access

C can't access

Full Access
Question # 13

After the Huawei sandbox detects the threat, how to deal with it:

A.

The sandbox will take the initiative to clear the part of the virus sample, similar to anti-virus software.

B.

The sandbox is a straight-line device that can directly kill the threat sample. C. The sandbox needs to be linked with other security devices to block the threat.

C.

You can use MTA to process the mail, so you can block the threat directly after detecting the damage.

Full Access
Question # 14

Which of the following are the types of rules supported by host check in terminal security?

A.

Ports and processes

B.

Firewall software

C.

Registry

D.

Operating system

E.

File

Full Access
Question # 15

The fingerprint feature that the Anti-DDos packet consistency check function can recognize is

A.

abbaabba

B.

abababab

C.

aaaabbbb

D.

aaaaaaaa

Full Access